tedjames said: We train our users not to click on links right away. First, hover over them to show the actual link. Then, key it in manually. And if they are not sure, they can always forward the email as an attachment to us to check out first. We have a really security-savvy group of users.
100% agree. This is the one thing I hate about O365 ATP Safe Links. It rewrites the URL
paul78 said: 100% agree. This is the one thing I hate about O365 ATP Safe Links. It rewrites the URL BTW - the latest version of Outlook decodes the ATP URL and displays the actual original URL. Perhaps you haven't patched <just kidding>
MitM said: That's exactly the point, they wouldn't. That's why the policy would require them to always enter a false password, any time that they are prompted to login after clicking a link from an email
UnixGuy said: MitM said: That's exactly the point, they wouldn't. That's why the policy would require them to always enter a false password, any time that they are prompted to login after clicking a link from an email so what happenes when they click on a malicious link, it asks them for a password, they enter a false password..malicious link responds with 'failed login', then they enter correct password..malicious link responds with 'failed login' again...I don't see how it'll prevent the passwords from being stolen
hmmmm What version? I'm running 1803 (Build 9126.2295). When you hover the link, it showsna01.safelinks.protection.outlook.com/?URL=<somewhat of the actual link>
yoba222 said: Malicious websites can infect end-users by simply visiting the site--no interaction needed. Encouraging end users to visit a potentially malicious website is a bad idea.
LionelTeo said: How is it entering a bad password going to help against a phishing site that would always prompt incorrect username or password? Also, is this policy enforce in its technological control? What about employee simply choose to enter their correct password on first login.